SHARE
Facebook X Pinterest WhatsApp

IT Managers Gird for Cyber Attacks

Cyber attacks like the high-profile Operation Aurora incident that targeted Google, Adobe Systems, and two dozen other U.S. companies are becoming the rule rather than the exception, according to a new survey commissioned by McAfee and the Center for Strategic and International Studies. More than half (54 percent) of 600 IT executives surveyed said their […]

Written By
thumbnail Larry Barrett
Larry Barrett
Jan 29, 2010
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Cyber attacks like the high-profile Operation Aurora incident that targeted Google, Adobe Systems, and two dozen other U.S. companies are becoming the rule rather than the exception, according to a new survey commissioned by McAfee and the Center for Strategic and International Studies.

More than half (54 percent) of 600 IT executives surveyed said their companies had already suffered a large-scale attack or stealthy infiltration from organized crime gangs, terrorists or nation-states, the report said.

The initial estimated cost of downtime associated with a major cyber attack incident is more than $6.3 million a day — expensive, but only a drop in the bucket compared to the price of losing key intellectual property or having a supply chain or Web site disrupted by strategically placed malware.

McAfee and the CSIS presented their report at the World Economic Forum in Davos, Switzerland, Thursday, hoping to shine an even brighter light on the serious damage hackers and nation-sponsored cyber terrorists could wreak on critical infrastructure such as electrical grids, oil and gas production, telecommunications and transportation networks.

Earlier this week, new revelations of orchestrated cyber attacks against ExxonMobil (NYSE: XOM), ConocoPhillips (NYSE: COP) and Marathon Oil (NYSE: MRO) originating from China brought this issue of national and economic security to the fore in a very real and distressing way.

The oil companies were targeted by unsolicited e-mails looking to extract proprietary information including “bid data” — the files containing details on the quantity, value and location of oil discoveries around the word. Officials close to the investigation said some of the attacks appeared to have originated in China and that servers located in the country were used to store some of the stolen data.

Read the rest at eSecurityPlanet.

  SEE ALL
ARTICLES
 
thumbnail Larry Barrett

Larry Barrett is a freelance journalist and blogger who has covered the information technology and business sectors for more than 15 years. Most recently, he served as the online news editor for 1105 Media's Office Technology Group and as the online managing editor for SourceMedia's Investment Advisory Group publications Financial Planning, On Wall Street, and Bank Investment Consultant. He was also a senior writer and editor at Ziff Davis Media's Baseline Magazine, winner of the Jesse H. Neal National Business Journalism Award, and ZDNet. In addition, he's served as a senior writer and editor at prominent technology and business websites including CNET, InternetNews.com, Multichannel News, and the San Jose Business Journal.

Recommended for you...

AI in Cybersecurity: The Comprehensive Guide to Modern Security
Liz Ticong
Apr 29, 2024
What Is Cybersecurity? Definitions, Practices, Threats
Liz Ticong
Apr 8, 2024
How to Secure a Network: 9 Key Actions to Secure Your Data
Liz Ticong
Mar 21, 2024
7 Best Data Security Software: Solutions For 2024
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.